58:01Securing Code in the Age of AI - Simona Toader - NDC Security 2026NDC Conferences451 views·2 days ago
53:31Automated Security Testing with OWASP Nettacker - Sam Stepanyan - NDC Security 2026NDC Conferences476 views·3 days ago
1:02:26Breaking the Black Box Why Testing Generative AI Is Full Spectrum - Jason Ross - NDC Security 2026NDC Conferences268 views·3 days ago
1:04:48OWASP Juice Shop Take your security vitamins! - Jannik Hollenbach & Björn KimminichNDC Conferences269 views·3 days ago
46:23It is rough without a WAF - José Carlos Chávez - NDC Security 2026NDC Conferences589 views·4 days ago
51:22Who Gave the Agent Admin Rights! Securing Cloud & AI Machine Identities - Bodhisattva DasNDC Conferences262 views·4 days ago
35:02AppSec Security The SDLC in the age of agentic - Jon Mccoy - NDC Security 2026NDC Conferences854 views·6 days ago
18:33Protocol-Hopping C2 Transport-Agnostic Command & Control That Won't Die - Francine SolheimNDC Conferences1.3K views·1 month ago
51:45¥app.alert(1) is the new alert(1) PDFs as a vector to inject JavaScript in web apps - Luigi GubelloNDC Conferences1.0K views·1 month ago
47:16From WAN to NAS A Pwn2Own Journey Through the SOHO Attack Surface - Daan Keuper - NDC Security 2026NDC Conferences793 views·1 month ago
50:43Secure and Compliant APIs - By Design - Daniel Sandberg & Tobias Ahnoff - NDC Security 2026NDC Conferences1.9K views·1 month ago
55:10Beyond the Commit Weaponizing and Hardening GitHub Actions - Niek Palm - NDC Security 2026NDC Conferences766 views·1 month ago
53:48Have I Been Pwned - A Passkey Journey - Stefán Jökull Sigurðarson - NDC Security 2026NDC Conferences823 views·1 month ago
52:51How to Know Your Client Is Real Hardware-Backed Authentication Patterns - Victor LyuboslavskyNDC Conferences713 views·1 month ago
57:07Your Website Is Running Code You’ve Never Seen - Scott Helme - NDC Security 2026NDC Conferences2.2K views·1 month ago
49:30sshlogin securely authenticating to remote Linux systems via ... - Ignat KorchaginNDC Conferences942 views·1 month ago
45:53Learning security monitoring through failure - Truls Dahlsveen - NDC Security 2026NDC Conferences366 views·1 month ago
44:30Connecting the dots to go from tabular security incident data to behavioral graph understandingNDC Conferences215 views·1 month ago
51:33The Risky Business, of AI Illiteracy - Sean Juroviesky - NDC Security 2026NDC Conferences1.6K views·1 month ago
59:11Post-quantum cryptography for .NET developers - Filip W. - NDC Security 2026NDC Conferences678 views·1 month ago
48:29Three decades of curl - Daniel Stenberg - NDC Security 2026NDC Conferences11.1K views·1 month ago
33:34Hijacking Google’s CICD Through Prompt InjectionThe New Era of AI-Based Exploits-Mackenzie JacksonNDC Conferences1.2K views·1 month ago
37:14Is Your Approach to Pipeline Security Flawed Rethinking CICD Security - Patricia RodriguesNDC Conferences2.2K views·1 month ago
38:49Anti-Patterns How to Not implement a Cloud Security tool - Johan Paramanathan - NDC Security 2026NDC Conferences831 views·1 month ago
57:32MITRE ATT&CK for Developers - Chris Ayers - NDC Security 2026NDC Conferences738 views·1 month ago
1:01:15Worms in our software supply chain - Where do we go from here - Charlie Eriksen - NDC Security 2026NDC Conferences737 views·1 month ago
53:28The server that talked back a deep dive into SSRFs - Sofia Lindqvist - NDC Security 2026NDC Conferences580 views·1 month ago
49:27Safe by design the UX of secure banking - Dora Makszy - NDC Security 2026NDC Conferences884 views·1 month ago